Edward Jaffe notes:

> As I stated, I've seen it done far more than I ever expected. 

The problem, Ed, is that you expect (or at least hope for) mostly
rational behavior, and you view such mechanisms as irrational and
odd (because there are better, more appropriate, ways to do this).

While I academically agree, I bet many such [remaining] practices
are rooted in history, from a time when RACF (et al.) security
control of access to SPOOLed SYSOUT data was simply not supported
or a site didn't have an ESM to begin with.  

Paul Gilmartin remembers:

> And as a user, I too have endured practices of bootleging 
> information to job processing components via the jobname, 
> simply because no other vehicle exists.  I believe we have 
> test subsystems on which I still must adjust my jobname to 
> select a library tape subpool.

Folks used existing knobs to control/enable desired function, 
and long ago there were insufficient knobs (particularly the 
concept of a JOB's so-called owner). So they used the knobs 
they knew they had at hand. JOB name was nothing more than a 
convenient knob, because little else was convenient/available. 

Edward Jaffe added:

> Many JES2/SDSF shops control job/spool access primarily by 
> enforcing job name standards. It's pretty ugly...

in response to Ted MacNEIL:

> Welcome to 1980!
> I know of nobody using jobname to protect access.

As a software vendor, I can tell you authoritatively that 
this practice occurs at a significant plurality of customer
sites. We frequently have to deal with customers who need
a bit of help getting the "rules" right. They expect to be
able to access certain output, and blame us when they can't.
We hold their hands and help them understand the mess they
are in, and figure out how to make it work for our products 
in their shop (at least on that particular day). 

Ed is right, it's pretty ugly. And more widespread that you
would ever (rationally) expect.

In fact, in the very early days of ESMs, back when ACF2 didn't 
even have a SAF interface (because SAF didn't yet exist or was
still brand-new), instead of using the (still brand-new) USER=
keyword parameter on the JOB statement (if it even was supported
by the customer's current MVS/SP system), many installations 
used a feature of Top Secret to derive what TSS calls the ACID
(what RACF calls the USER) from up to 8 characters selected by
rule from fields such as the JOB name, Programmer Name, Accounting
Information [sub]fields, etc. That practice continued at many
TSS shops for years, and I recently shot a problem at a customer
site where it's still the way things are done (~25 years later).
Even for JES2 sites (who could use SDSF if they were desperate), 
RYO SPOOL browsers were common and used a variety of installation-
specific knobs to control end (TSO) user access to SYSOUT data in
both the distant and not-so-distant past.

Stuff like this is hard for shops to change, much less give up.
The reason I have little sympathy for them is that most of the
pain is self-inflicted, especially since the cure is less costly 
than the continued hit on end user productivity.

In the early 90s I remember being onsite at a large insurance 
company -- a TSS customer with very arcane rules for JOB and
programmer names and accounting information field contents, all
of which were used to construct the actual TSS ACID to be used. 
The rules were so restrictive that it was difficult for me to 
come up with much more than 20 different JOB names, much less
mnemonic or suggestive ones. When I looked at the JOB queue,
I typically saw dozens, even hundreds of identically-named
JOBs. Picking up my own printouts at the remote printer was an
exercise in snooping on everybody else's work, since the rules
tended to make lowly programmers use JOB names that matched
those submitted by other programmers. I was fighting not only
the rules to get more than one of my JOBs to execute at the 
same time (an absolute requirement for a multi-address space
product), but other programmers' JOBs as well. 

--
WB

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [email protected] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

Reply via email to